General

  • Target

    jew.mips.elf

  • Size

    125KB

  • Sample

    241206-qjd8lavnam

  • MD5

    c5ac3c0d137d7a994fb24f0d05335848

  • SHA1

    1aca371b36bf8170bdc06e7014a5aef1c89ac0d9

  • SHA256

    bd1585f0afe62dc9966151ce8f722958b21846e3a164dad19cf266a14bb5075d

  • SHA512

    2dd5eedb9f9e1967db8a8025435f4bd9781592342e27ee66dd64c3ed63ec688b83adaff3995cece7f59c7acb68d93bcd2fbbdce35b94e318b9a955cb0dd64c80

  • SSDEEP

    3072:k9CY3nsXRx2+hgnSXsxVLdEgrUpziNn3Ik8LINFb1lNWEB:k9CY3nsXRx2+hrXsxVLdEgrUrWFb1lND

Malware Config

Extracted

Family

mirai

Botnet

KURC

Targets

    • Target

      jew.mips.elf

    • Size

      125KB

    • MD5

      c5ac3c0d137d7a994fb24f0d05335848

    • SHA1

      1aca371b36bf8170bdc06e7014a5aef1c89ac0d9

    • SHA256

      bd1585f0afe62dc9966151ce8f722958b21846e3a164dad19cf266a14bb5075d

    • SHA512

      2dd5eedb9f9e1967db8a8025435f4bd9781592342e27ee66dd64c3ed63ec688b83adaff3995cece7f59c7acb68d93bcd2fbbdce35b94e318b9a955cb0dd64c80

    • SSDEEP

      3072:k9CY3nsXRx2+hgnSXsxVLdEgrUpziNn3Ik8LINFb1lNWEB:k9CY3nsXRx2+hrXsxVLdEgrUrWFb1lND

    • Contacts a large (95313) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Writes file to system bin folder

MITRE ATT&CK Enterprise v15

Tasks